Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷£¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍ·þÎñÖжÏ
°ä²¼¹¦·ò 2022-03-15Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷£¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍ·þÎñÖжÏ
¾ÝýÌå3ÔÂ12ÈÕ±¨Â·£¬ÊÓÆµÓÎÏ·¿ª·¢ÉÌÓý±Ì£¨Ubisoft £©Ö¤Êµ£¬ËüÔÚÉÏÖÜÔâµ½ÍøÂç¹¥»÷£¬µ¼ÖÂÆäÓÎÏ·¡¢ÏµÍ³ºÍ·þÎñÖжϡ£¸Ã¹«Ë¾°µÊ¾ËûÃǵÄÍŶÓÔÚµ÷²é´ËÎÊÌ⣬ÏÖÒÑÈ·ÈÏûº±¼û¾Ýй¶¼£Ï󣬲¢ÇÒ³ÁÖÃÁËÈ«¹«Ë¾µÄÃÜÂë¡£3ÔÂ4ÈÕ£¬¾ÍÓÐЧ»§ÔÚTwitterºÍDowndetectorÉϰµÊ¾ËûÃÇÔÚ½Ó¼ûÓý±ÌµÄijЩ·þÎñʱ³öÏÖÎÊÌ⡣ĿǰÉÐÎÞ¹ØÓÚÕâ´Î¹¥»÷µÄ¾ßÌåÐÅÏ¢£¬µ«Lapsus$°ä²¼ÁËÐÂÎŰµÊ¾´ËÊÂÓëËüÓйء£
https://securityaffairs.co/wordpress/128929/hacking/ubisoft-cyber-security-incident.html
LockBitÐû³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾µÄ¹¥»÷ÊÂÎñÕÆ¹Ü
LockBitÔÚ3ÔÂ11ÈÕ°ä²¼ÐÂÎÅ£¬Ðû³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾£¨Bridgestone Americas£©µÄ¹¥»÷ÊÂÎñÕÆ¹Ü¡£ÕâÊÇÈ«Çò×î´óµÄÂÖÌ¥Ôì×÷ÉÌÖ®Ò»£¬ÔÚÈ«ÇòÓµº±¼ûÊ®¸ö³ö²úµ¥ÔªºÍ³¬¹ý130000¸öÔ±¹¤¡£ÆÕÀû˾ͨ°ä²¼µÄÉêÃ÷³Æ£¬ËûÃÇÔÚ2ÔÂ27ÈÕ¼ì²âµ½Ò»Â·IT°²È«ÊÂÎñ£¬ÔÚ¶ÔÊÂÎñµÄÁìÓòºÍÐÔÖÊ·¢Õ¹µ÷²é¡£LockBitÊǵ±½ñ×î»îÔ¾µÄÀÕË÷ÍÅ»ïÖ®Ò»£¬Ä¿Ç°Éв»Ã÷ÏÔËü´ÓÆÕÀû˾ͨÇÔÈ¡ÁËÄÄЩÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/bridgestone-americas-confirms-ransomware-attack-lockbit-leaks-data/
×êÑÐÈËÔ±·¢ÏÖ¶à¸öÖ÷Á÷°üÖÎÀíÆ÷ÖдæÔÚ°²È«·ì϶
¾Ý3ÔÂ11ÈÕ±¨Â·£¬SonarSourceµÄ×êÑÐÈËÔ±·¢ÏÖ¶à¸öÖ÷Á÷°üÖÎÀíÆ÷ÖдæÔÚ°²È«·ì϶¡£°üÖÎÀíÆ÷ÊÇÖ¸ÓÃÓÚ×Ô¶¯×°Öá¢Éý¼¶¡¢ÅäÖÿª·¢ÀûÓ÷¨Ê½ËùÐèµÄµÚÈý·½ÒÀÀµÏîµÄϵͳ»ò¹¤¾ß£¬´æÔÚ·ì϶µÄÀûÓÃÔ̺¬Composer¡¢Bundler¡¢Bower¡¢Poetry¡¢Yarn¡¢pnpm¡¢PipºÍPipenv¡£×êÑÐÈËÔ±°µÊ¾£¬¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶À´Ö´ÐÐËÁÒâ´úÂë²¢´ÓÖ¸±êÉ豸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬Ô̺¬Ô´´úÂëºÍ½Ó¼ûÁîÅÆµÈ¡£
https://thehackernews.com/2022/03/multiple-security-flaws-discovered-in.html
¶íÂÞ˹¹ú·À¹«Ë¾RostecÒòÔâµ½DDoS¹¥»÷ÍøÕ¾¹Ø¹Ø
3ÔÂ11ÈÕ£¬¶íÂÞ˹¹úÓк½¿Õº½ÌìºÍ¹ú·À¼¯ÍÅRostec°µÊ¾£¬ÆäÍøÕ¾ÒòÔâµ½ÍøÂç¹¥»÷¶ø±»¹Ø¹Ø¡£¸Ã¹«Ë¾°µÊ¾£¬×Ô2ÔÂÏÂÑ®ÒÔÀ´ÆäÍøÕ¾Ò»ÏòÔâ·ê×ÅΧ¹¥¡£×îеÄÒ»´Î¹¥»÷ʼÓÚµ±ÈÕÉÏÎç11µã30·Ö£¬À´×ÔÎÚ¿ËÀ¼Ð³ÉÁ¢µÄIT¾ü¶Ó¡£¸ÃÎÚ¿ËÀ¼×éÖ¯ÔçЩʱ³½ÔÚTelegramÖа䲼ÐÂÎÅ£¬½«RostecµÄ¶à¸öÓòÈ·ÒÔΪÆäÉ¢²¼Ê½»Ø¾ø·þÎñ(DDoS)¹¥»÷µÄÖ¸±ê¡£Rostec³ÆÍøÕ¾ºÜ¿ì¾Í¸´ÔÁËÕý³£ÔËÐУ¬Ä¿Ç°ËùÓÐÐÅÏ¢¾ùÒÑ¿ÉÓá£
https://www.bleepingcomputer.com/news/security/russian-defense-firm-rostec-shuts-down-website-after-ddos-attack/
Anonymousй¶¶íÂÞ˹»ú¹¹RoskomnadzorµÄ820GBÊý¾Ý
¾ÝýÌå3ÔÂ11ÈÕ±¨Â·£¬AnonymousÐû³ÆÈëÇÖÁ˶íÂÞË¹ÖØÒªµÄ¹Ù·½»ú¹¹Roskomnadzor£¨±ðÃûÁª¹úͨѶ¡¢ÐÅÏ¢¼¼ÊõºÍ¹«¹²Ã½Ìå¼à¶½¾Ö£©¡£¸ÃÍÅ»ï×ܹ²Ð¹Â¶ÁËÔ¼820GBµÄÊý¾Ý£¬ÆäÖÐÔ̺¬³¬¹ý360000¸öÎļþ£¨536.9 GB£©ºÍ2¸öÔ̺¬HR·¨Ê½µÄÊý¾Ý¿â£¨290.6 GB£©¡£´Ë±í£¬AnonymousÔÚ½üÆÚ»¹ÈëÇÖÁ˶íÂÞ˹Լ90%µÄÅäÖÃÃýÎóµÄÔÆÊý¾Ý¿â¡£
https://www.hackread.com/anonymous-hacks-roskomnadzor-russia-agency/
¶«Ó³¶¯»¹«Ë¾»òÒòÔâµ½ÀÕË÷¹¥»÷º£ÔôÍõµÈ¶¯ÂþÑÓ²¥
3ÔÂ11ÈÕ£¬ÈÕ±¾¶«Ó³¶¯»¹«Ë¾£¨Toei£©°ä²¼×îÐÂÐÂÎÅ£¬³ÆÓÉÓÚÍøÂç¹¥»÷µ¼ÖÂÄÚ²¿ÏµÍ³¹Ø¹Ø£¬¶¯ÂþµÄÔì×÷Òѱ»ÍƳ١£Òò¶ø£¬¡¶ÓÂÕß¶·¶ñÁú´óÍõ½£¡·¡¢¡¶Delicious Party Precure¡·¡¢¡¶ÊýÂ뱦±´¹í»êÓÎÏ·¡·ºÍ¡¶º£ÔôÍõ¡·Ð¾缯µÄ²¥³ö½«ÑÓ³¤£¬Ö±ÖÁÁíÐÐ֪ͨ¡£ÕâÁÔôÍõµÄ·ÛË¿ÃǼ«¶È¾øÍû£¬ËûÃÇÕýµÈ´ý¸ÃϵÁеÚ1000Õµİ䲼¡£Æ¾¾ÝToeiµÄ²¼¸æ£¬ÆäÔÚ3ÔÂ6ÈÕ¼ì²âµ½Î´¾ÊÚȨµÄ½Ó¼û£¬²¢ÔÚ´ÎÈչعØÁËËùÓеÄÄÚ²¿ÏµÍ³£¬¶Ô´ËÊ·¢Õ¹µ÷²é¡£¸÷ÖÖ¼£ÏóÅú×¢ÕâÊÇһ·ÀÕË÷¹¥»÷ÊÂÎñ£¬µ«Ä¿Ç°×êÑÐÈËÔ±»¹ÎÞ·¨Ö¤ÊµÕâÒ»µã¡£
https://www.bleepingcomputer.com/news/security/new-one-piece-anime-episodes-delayed-after-toei-cyberattack/
°²È«¹¤¾ß
ASSAMEE
Anonfiles µÄÃâ·Ñ¸ß¼¶¼ÓÃÜÆ÷£¬Ê¹Óø߼¶¼ÓÃܲ½ÖèʹÓà AES-256 ¼ÓÃÜĿ¼¡£
https://github.com/samhaxr/ASSAMEE
Scanmycode Ce
ËüÊÇÒ»ÖÖ´úÂëɨÃè/SAST/¾²Ì¬·ÖÎö/Linting ½â¾ö¹æ»®£¬Ê¹Óúܶ๤¾ß/ɨÃèÒǺÍÒ»¸ö»ã±¨¡£
https://github.com/marcinguy/scanmycode-ce
Oh365UserFinder
ÓÃÓÚ¼ø±ðÓÐЧµÄ o365 ÕÊ»§ºÍÓò£¬¶ø²»´æÔÚÕÊ»§Ëø¶¨µÄ·çÏÕ¡£
https://github.com/dievus/Oh365UserFinder
ADExplorerSnapshot.py
ÊÇAD Explorer ¿ìÕÕ½âÎöÆ÷£¬×÷Ϊ BloodHound µÄ ingestor£¬»¹Ö§³Ö½«ÆëÈ«¶ÔÏóת´¢µ½ NDJSON¡£
https://github.com/c3c/ADExplorerSnapshot.py
°²È«·ÖÎö
AnonymousÈëÇÖÁ˶íÂÞ˹µÄ 400 ¸ö°²È«ÉãÏñÍ·
https://www.hackread.com/anonymous-sent-texts-to-russians-hacked-security-cams/
Riverbed Èí¼þÖдæÔÚµÄ4¸öÑϳÁµÄ·ì϶
https://www.theregister.com/2022/03/11/riverbed_vulnerabilities/
ͨ¹ý¿ìÂÊÏÞ¶È RDP ±©Á¦¹¥»÷
https://blog.malwarebytes.com/explained/2022/03/blunting-rdp-brute-force-attacks-with-rate-limiting/
Kali Linux ΪÂã»ú×°ÖÃÔö³¤ÁËÀàËÆ VM µÄ¿ìÕÕÖ°ÄÜ
https://www.bleepingcomputer.com/news/linux/kali-linux-adds-vm-like-snapshot-feature-to-bare-metal-installs/
Å·Ä·Áú PLC ±à³ÌÈí¼þÖн¨²¹µÄ¸ßΣ·ì϶
https://www.securityweek.com/high-severity-vulnerabilities-patched-omron-plc-programming-software


¾©¹«Íø°²±¸11010802024551ºÅ